A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Public Evidence from Secret Ballots
[chapter]
2017
Lecture Notes in Computer Science
Elections seem simple-aren't they just counting? But they have a unique, challenging combination of security and privacy requirements. The stakes are high; the context is adversarial; the electorate needs to be convinced that the results are correct; and the secrecy of the ballot must be ensured. And they have practical constraints: time is of the essence, and voting systems need to be affordable and maintainable, and usable by voters, election officials, and pollworkers. It is thus not
doi:10.1007/978-3-319-68687-5_6
fatcat:jremw3az2rey5jxlb3ujegbthu